Unlocking the hidden resources that could solve the cyber skills crisis [Q&A]


There was already a shortage of cyber skills before the COVID-19 pandemic hit, and since then we've had a perfect storm of home working and the Great Resignation to make things worse still.
But is there an unexploited resource out there that could help fill the skills gap? Sonny Sandelius, assistant director of workforce programs at cyber security training skills company SANS believes there could be in the form of an army of the hobbyists and DIYers.
Ensuring compliance in the modern enterprise [Q&A]


An increasing volume of regulations surrounding the security and privacy of data have been implemented in recent years. This represents a challenge for businesses that need to ensure they remain compliant.
The challenge has become even greater due to the pandemic and the consequent shift in working patterns. So how can enterprises ensure that they remain compliant and don't fall foul of the rules?
The challenge of guarding against supply chain attacks [Q&A]

Why the time is right for enterprises to consider edge computing [Q&A]


The technology world never stands still for very long and keeping in touch with trends is important if you're not to be left behind.
In recent years we've seen moves to the cloud and to DevOps, trends which show no signs of slowing down. But there's now a trend towards putting computing power at the edge, closer to the users.
The CSO's new seat at the executive table and how to use it [Q&A]


With the changes to working patterns brought about by the pandemic and increasing levels of cyberattacks, the role of the Chief Security Officer (CSO) in businesses has become more challenging.
These things have also led to a boost in the status of CSOs within their organizations. We spoke to Chaim Mazal, CISO and SVP of engineering for Apple device management platform Kandji to find out more about how things have changed and how CSOs can make the most of their new influence to drive security strategy.
How you can take back control of your online data [Q&A]


If you use the internet then it's certain that some organization somewhere is storing data about you. Indeed research shows that people are happy to share information in exchange for a better consumer experience.
However, that data is still yours, so how can you understand what information you're giving away and how can you take better control?
Developing smart tools for Windows -- the man behind CCleaner and Tweakeze [Q&A]


Heitor Tome is the man behind a new tool called Tweakeze which is designed to prevent unwanted changes to your computer.
But he also has a long history as the chief architect and software engineer behind popular cleanup program CCleaner -- indeed for several years he was its sole developer.
Why networking technologies remain at the heart of online security [Q&A]


Networks and the internet are reliant on domain name servers, dynamic host control protocol, and IP address management. These three technologies -- grouped together as DDI (DNS, DHCP, IPAM) -- are central to the way things work but that also makes them a tempting target.
We spoke to Ronan David, chief of strategy at EfficientIP to find out why DDI is so vital to online security and how automation can help with defense.
The changing role of the CISO [Q&A]


Digital transformation, a shift to hybrid and remote working, and increasing regulatory pressure have seen major changes to the enterprise IT landscape in recent years.
CISOs have been at the heart of this, facing new challenges and taking on additional responsibilities. We spoke to Ben Smith, field CTO of NetWitness, to discuss these changes and find out what makes a good, or bad, CISO.
SaaS and what it can teach us about human behavior [Q&A]


Software-as-a-service has become increasingly popular and the market for it is still growing -- expected to reach $264 billion (£207 billion) by 2026.
SaaS sales are being driven by more companies continuing to digitize their operations in a post-COVID-19 world. We spoke to Paul Quigley, CEO and co-founder of predictive, real-time media monitoring platform NewsWhip, to discover how using SaaS can improve operations for a company, help grow the business, and even offer insights into human behavior.
How IT can fix the employee experience [Q&A]


The world of work has changed quite considerably over the past few years, driven by a number of factors, not least the pandemic.
Many of these changes have been positive, but some, in particular the shift to hybrid working, have brought challenges too. Some tasks are simply more difficult to do remotely.
Good backups are critical to recovering from ransomware


A new report from Enterprise Strategy Group (ESG), sponsored by Keepit, shows that granular and air-gapped backup are critical to data recovery when businesses are hit by ransomware.
Of more than 600 respondents to the survey, 79 percent have experienced a ransomware attack within the last year, with 17 percent experiencing attacks weekly and 13 percent daily.
Outsmarting the new generation of online fraudsters [Q&A]


Millions of dollars are lost to online scams each year and the fraudsters are getting ever more sophisticated in the targeting of their attacks.
Much of today's fraud is executed using information about the consumer's habits and personal details, usually captured in phishing attacks or data breaches. The fact that we’re conducting more of our transactions online as a result of the pandemic has created even more opportunity for fraudsters.
Behavioral analytics and why it's important to threat detection and response [Q&A]


Traditional rule-based security techniques centered on malware signatures and perimeter protection are increasingly unable to cope with the latest, more sophisticated threats.
Taking a more behavior-based approach to spotting unusual or risky activity offers a solution, but what is required to make it work? We spoke to Sanjay Raja, VP of product marketing and solutions at cybersecurity specialist Gurucul, to find out.
What Log4Shell still means for the enterprise [Q&A]


When the Log4Shell vulnerability first appeared at the end of last year it sent a shockwave through the cybersecurity community.
But just because it's no longer in the headlines doesn't mean it's gone away. There's still a lot that enterprises can learn from the vulnerability and the response to it. We spoke to Maninder Singh, corporate vice president and global head of cybersecurity and GRC services at HCL Technologies, to find out more.
Recent Headlines
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.